• CRYPTREC is the Cryptography Research and Evaluation Committees set up by the Japanese Government to evaluate and recommend cryptographic techniques for...
    8 KB (974 words) - 00:22, 19 August 2023
  • KCipher-2 (category Cryptography stubs)
    published by the Japanese Cryptography Research and Evaluation Committees (CRYPTREC). It has a key length of 128 bits, and can encrypt and decrypt around seven...
    2 KB (156 words) - 14:44, 9 April 2024
  • Thumbnail for State Cryptography Administration
    implementation of cryptographic work regulations, is responsible for managing cryptography research, production, sales, evaluation, and application, plans and manages...
    4 KB (220 words) - 19:43, 16 March 2025
  • progress in the research on quantum computing, necessitating a re-evaluation of our cryptographic strategy." NSA advised: "For those partners and vendors that...
    9 KB (929 words) - 15:23, 23 December 2024
  • computer scientist who works on cryptography research at Amazon Web Services. Born in Israel in 1966, Halevi received a B.A. and M.Sc. in computer science from...
    9 KB (786 words) - 21:07, 6 February 2025
  • systems security. This issue was eventually addressed by combining cryptography and system security discussions in the same sessions. In 2011, the conference...
    15 KB (1,707 words) - 21:24, 4 December 2024
  • Thumbnail for Anne Canteaut
    Anne Canteaut is a French researcher in cryptography, working at the French Institute for Research in Computer Science and Automation (INRIA) in Paris...
    6 KB (483 words) - 00:23, 19 February 2025
  • Thumbnail for Dorothy E. Denning
    Dorothy E. Denning (category Computer systems researchers)
    associate professor at Purdue (1981-1983), she wrote her first book, Cryptography and Data Security in 1982. She joined SRI International as computer scientist...
    20 KB (2,203 words) - 00:43, 18 March 2025
  • Thumbnail for Oded Goldreich
    Oded Goldreich (category International Association for Cryptologic Research fellows)
    pseudorandomness, zero knowledge proofs, secure function evaluation, property testing, and other areas in cryptography and computational complexity. Goldreich has also...
    15 KB (1,378 words) - 09:52, 15 March 2025
  • advocates the widespread use of strong cryptography and privacy-enhancing technologies as a means of effecting social and political change. The cypherpunk movement...
    53 KB (5,592 words) - 01:11, 25 April 2025
  • began sending technical assistance to upgrade their communications and cryptography capabilities. One part was to send them modified Enigma machines to...
    37 KB (5,378 words) - 22:26, 23 December 2024
  • interpretations. Some national evaluation schemes are phasing out EAL-based evaluations and only accept products for evaluation that claim strict conformance...
    30 KB (3,769 words) - 00:01, 9 April 2025
  • Thumbnail for Institute for Defense Analyses
    implementation and evaluation of research and development programs Provide technical support and analysis to the President’s Council of Advisors on Science and Technology...
    31 KB (3,599 words) - 21:49, 23 November 2024
  • Thumbnail for Claude Shannon
    Claude Shannon (category Members of the Royal Netherlands Academy of Arts and Sciences)
    ISBN 978-0691151007 Everett M. Rogers, Claude Shannon's Cryptography Research During World War II and the Mathematical Theory of Communication, 1994 Proceedings...
    83 KB (8,363 words) - 18:00, 10 May 2025
  • Thumbnail for Data Encryption Standard
    has been highly influential in the advancement of cryptography. Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the...
    60 KB (6,714 words) - 15:08, 11 April 2025
  • Thumbnail for Computer science
    abstract models of computation and general classes of problems that can be solved using them. The fields of cryptography and computer security involve studying...
    72 KB (6,673 words) - 05:26, 18 April 2025
  • IPsec (category Cryptographic protocols)
    authentication between agents at the beginning of a session and negotiation of cryptographic keys to use during the session. IPsec can protect data flows...
    44 KB (5,337 words) - 23:10, 17 April 2025
  • Streebog (category Cryptographic hash functions)
    Russian Technical Committee for Standardization "Cryptography and Security Mechanisms" (TC 26) with the participation of Academy of Cryptography of the Russian...
    8 KB (854 words) - 17:38, 7 January 2025
  • National Cyber Security Hall of Fame (category Science and technology halls of fame)
    cryptography system with Diffie and Hellman Whitfield Diffie – developed the world's earliest public key cryptographic system along with Merkle and Hellman...
    11 KB (1,093 words) - 03:01, 11 April 2025
  • Thumbnail for Warren Weaver
    Warren Weaver (category American operations researchers)
    electronic calculating machines and the successful application of mathematical and statistical techniques in cryptography. He has served as a member of...
    18 KB (2,082 words) - 07:01, 30 January 2025
  • functional programming language with type inference and lazy evaluation. Designed for teaching, research, and industrial applications, Haskell pioneered several...
    50 KB (4,584 words) - 21:59, 17 March 2025
  • Crypto Wars (category History of cryptography)
    made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption...
    37 KB (4,098 words) - 16:28, 10 May 2025
  • General der Nachrichtenaufklärung (category Cryptography organizations)
    do with the chi-squared test, a common cryptographic test used as part of deciphering of enciphered message, and invented by Solomon Kullback, but simply...
    288 KB (39,359 words) - 08:27, 10 May 2025
  • Thumbnail for Intelligence Advanced Research Projects Activity
    quantum computing and neuroscience. IARPA is a major funder of quantum computing research, due to its applications in quantum cryptography. As of 2009, IARPA...
    30 KB (2,542 words) - 10:58, 9 March 2025
  • Thumbnail for Organization Department of the Chinese Communist Party
    effective evaluation procedure is not yet in place. Crucial policy areas, such as environmental issues, are not being evaluated, and evaluation is predominantly...
    18 KB (1,696 words) - 11:24, 26 April 2025
  • networking. The research activities of the Centre are on cryptography, network security, internet access over the power line medium and many others. In...
    25 KB (3,009 words) - 17:52, 2 May 2025
  • INDECT (category Research projects)
    information using quantum cryptography and new methods of digital watermarking Performing computer-aided detection of threats and targeted crimes in Internet...
    11 KB (908 words) - 20:07, 31 January 2025
  • Thumbnail for Cipher Department of the High Command of the Wehrmacht
    Cipher Department of the High Command of the Wehrmacht (category Cryptography organizations)
    do with the chi-squared test, a common cryptographic test used as part of deciphering of enciphered message, and invented by Solomon Kullback, but simply...
    132 KB (15,440 words) - 22:35, 17 November 2024
  • rigor of security evaluations. Part 4: Framework for the specification of evaluation methods and activities – Details the methodology and framework for conducting...
    33 KB (3,524 words) - 11:40, 11 May 2025
  • Thumbnail for Elie Bursztein
    where he collaborated with Dan Boneh and John Mitchell on web security, game security, and applied cryptographic research. His work at Stanford University...
    28 KB (1,926 words) - 20:35, 15 January 2025